Login / Signup
An encrypted speech authentication and tampering recovery method based on perceptual hashing.
Qiu-yu Zhang
Deng-hai Zhang
Fu-jiu Xu
Published in:
Multim. Tools Appl. (2021)
Keyphrases
</>
detection method
similarity measure
speech recognition